Draytek VigorSwitch P2282x handleiding

366 pagina's
PDF beschikbaar

Handleiding

Je bekijkt pagina 4 van 366
II-6 Multicast................................................................................................................................................................................ 68
II-6-1 IGMP Snooping.................................................................................................................................................... 68
II-6-1-1 IGMP Snooping ............................................................................................................................................ 68
II-6-1-2 VLAN Setting................................................................................................................................................. 69
II-6-1-3 Group Table.................................................................................................................................................. 71
II-6-1-4 Filtering Profile............................................................................................................................................. 72
II-6-2 MVR ...................................................................................................................................................................... 74
II-6-2-1 Port Setting................................................................................................................................................... 75
II-6-2-2 Static Group ................................................................................................................................................. 76
II-6-3 MLD Snooping..................................................................................................................................................... 78
II-6-3-1 MLD Snooping.............................................................................................................................................. 78
II-6-3-2 VLAN Setting................................................................................................................................................. 79
II-6-3-3 Group Table.................................................................................................................................................. 81
II-6-3-4 Filtering Profile............................................................................................................................................. 82
II-7 ONVIF Surveillance............................................................................................................................................................... 84
II-7-1 Topology .............................................................................................................................................................. 85
II-7-2 Snapshot Stream................................................................................................................................................. 89
II-7-3 Device Maintenance............................................................................................................................................ 90
II-8 RADIUS/TACACS+.................................................................................................................................................................. 94
II-8-1 RADIUS ................................................................................................................................................................. 94
II-8-2 TACACS+............................................................................................................................................................... 96
Chapter III Security........................................................................................................................................................99
III-1 802.1x/MAC Authentication............................................................................................................................................. 100
III-1-1 802.1x/MAC Authentication ............................................................................................................................ 100
III-1-2 Local MAC Account .......................................................................................................................................... 103
III-1-3 Authentication Hosts ....................................................................................................................................... 106
III-2 Access Control List............................................................................................................................................................ 107
III-2-1 Access Control List ........................................................................................................................................... 107
III-2-2 Apply to Port..................................................................................................................................................... 117
III-3 IP Source Guard ................................................................................................................................................................ 119
III-4 Port Security ...................................................................................................................................................................... 121
III-5 Storm Control.................................................................................................................................................................... 123
III-6 DoS ..................................................................................................................................................................................... 125
III-6-1 Properties ......................................................................................................................................................... 125
III-6-2 Port Setting....................................................................................................................................................... 127
III-7 Dynamic ARP Inspection .................................................................................................................................................. 128
III-7-1 Properties ......................................................................................................................................................... 128
III-7-2 Statistics ............................................................................................................................................................ 129
III-8 DHCP Snooping................................................................................................................................................................. 130
III-8-1 DHCP Snooping................................................................................................................................................ 130
III-8-2 Option82 ........................................................................................................................................................... 131
III-8-3 Statistics ............................................................................................................................................................ 133
III-9 IP Conflict Prevention ....................................................................................................................................................... 134
III-10 Loop Protection............................................................................................................................................................... 139
III-11 Port Recovery .................................................................................................................................................................. 141
Chapter IV Utilities ......................................................................................................................................................143
IV-1 Device Check ..................................................................................................................................................................... 144
IV-2 Cable Diagnostics.............................................................................................................................................................. 146
IV-3 Ping Test............................................................................................................................................................................. 147

Bekijk gratis de handleiding van Draytek VigorSwitch P2282x, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.

Productinformatie

MerkDraytek
ModelVigorSwitch P2282x
CategorieNiet gecategoriseerd
TaalNederlands
Grootte71233 MB